You are on page 1of 12

STEGANOGRAPHY THE ART OF HIDING THE DATA

by:Abhale Amol And Kapse Sagar

CONTNENTS
Introduction:Steganographic techniques:Applications:Advantages:Disadvantages:Conclusion:References:-

Introduction
History: Greek(440 BC)

Art of hiding data.

Working Principle

The Embedding Model

INFO

Encryption Key

HIDDEN INFO Stego


Key

STEGO OUTPUT

COVER MEDIUM

Steganographic techniques
Physical steganography:Digital steganography:Network steganography:Printed steganography:Text steganography:Steganography using Sudoku Puzzle:-

Digital Stegnography:Image

Images have a lot of data:Spam Mail: 1,108 Bytes Picture of Dave: 152 KB Ways to hide information:Least significant bit (BMP) Palette Shifts (GIF) Discrete Cosine Transforms (JPG)

DIGITAL STEGANOGRAPHY EXAMPLE

Image of a tree. Removing all but the two least significant bits of each color component produces an almost completely black image.

Making that image 85 times brighter produces the image below.

FIG:-RESULTANT IMAGE OF STEGANOGRAPHY

Audio Stegnography:Audio files contain even more data:Spam Mail: 1,108 Bytes Picture of Dave: 152 KB Sneaker s Theme: 3,466 KB Ways to hide information Least significant bit (RAW) Complicated stuff we don t understand (MP3)

Sudoku Puzzle Stenograhy


 Hide Data within the image using sukodo.  Steganography using sudoku puzzles has as many keys as there are possible solutions of a Sudoku puzzle, which is 6.71*10^21.  This is equivalent to around 70 bits, making it much stronger

Applications
Usage in modern printers:- Each page of printing contains small dots of yellow colour. Example from modern practice:-Digital pictures(which contain large amounts of data) are used to hide messages on the Internet and on other communication media. Alleged use by terrorists: Alleged use by intelligence services:Intelligence service uses customized steganography software.

Conclusion
Steganography in it s multitude of forms can be equally effective in being constructive as well as destructive This presentation covers only a tiny fraction of the whole gamut that might go well beyond digital images, text, audio, and video only. Like, voice, communication channels, protocols , other text and binaries Inherently, it is neither good or bad. It is the manner in which it is used that will decide the outcome

You might also like